BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails

被引:12
作者
Ahmad, Ashar [1 ]
Saad, Muhammad [1 ]
Al Ghamdi, Mohammed [2 ]
Nyang, DaeHun [3 ]
Mohaisen, David [1 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
[2] Umm AlQura Univ, Makkah City 21421, Saudi Arabia
[3] Ewha Womans Univ, Seoul 03760, South Korea
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 01期
关键词
Blockchains; Databases; Urban areas; Servers; Throughput; Buildings; Bitcoin; Audit logs; audit trails; blockchain; databases; distributed systems; e-government performance;
D O I
10.1109/JSYST.2021.3097744
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Audit trails are critical components in enterprise business applications, typically used for storing, tracking, and auditing data. Entities in the audit trail applications have weak trust boundaries, which expose them to various security risks and attacks. To harden the security and develop secure by design applications, blockchain technology has been recently introduced in the audit trails. Blockchains take a consensus-driven clean slate approach to equip audit trails with secure and transparent data processing, without a trusted intermediary. On a downside, blockchains significantly increase the space-time complexity of the audit trails, leading to high storage costs and low transaction throughput. In this article, we introduce BlockTrail, a novel blockchain architecture that fragments the legacy blockchain systems into layers of codependent hierarchies, thereby reducing the space-time complexity and increasing the throughput. BlockTrail is prototyped on the "practical Byzantine fault tolerance" protocol with a custom-built blockchain. Experiments with BlockTrail show that compared to the conventional schemes, BlockTrail is secure and efficient, with low storage footprint.
引用
收藏
页码:1367 / 1378
页数:12
相关论文
共 33 条
[11]   Blockchain-Based Logging for the Cross-Border Exchange of eHealth Data in Europe [J].
Castaldo, Luigi ;
Cinque, Vincenzo .
SECURITY IN COMPUTER AND INFORMATION SCIENCES, EURO-CYBERSEC 2018, 2018, 821 :46-56
[12]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[13]  
Chang Y., 2018, ARXIV180801795
[14]  
Chen J, 2018, IEEE INFOCOM SER, P2069
[15]  
Community, 2020, NHIBERNATE
[16]  
GDPR, 2019, General Data Protection Regulation
[17]   On the Security and Scalability of Bitcoin's Blockchain [J].
Karame, Ghassan O. .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1861-1862
[18]  
Lee K. H., 2013, P ACM SIGSAC C COMP, DOI DOI 10.1145/2508859.2516731
[19]  
Ma D., 2009, Transactions on Storage, V5, P1
[20]   Trusternity: Auditing Transparent Log Server with Blockchain [J].
Nguyen, Hoang-Long ;
Ignat, Claudia-Lavinia ;
Perrin, Olivier .
COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018), 2018, :79-80